Computer Science Homework Help

SU Sex Crimes Victimization and Obscenity on the World Wide Web Discussion



You work as an information security specialist for a large financial company and your Chief Information Security Officer (CISO) has asked you to investigate recent online attacks that have occurred against certain individuals within your organization. The CISO wants to ensure that the company is well protected against these types of attacks. Look into victims, perpetrators, and how to mitigate risk.

Assess the difficulties faced by law enforcement in detecting, investigating, and prosecuting cases of cyberstalking and cyber exploitation.

Analyze three Supreme Court cases that have been decided concerning federal efforts to target cybercriminals and protect children online.

Describe two groups affected by cyber exploitation, bullying, stalking, and obscenity.

Describe the characteristics of perpetrators of Internet cyberstalking and exploitation

Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

Evaluate how the Internet is used for cybercrime, cyberstalking, and other abusive behaviors.

Computer Science Homework Help

SJSU Machine Learning for Cyber Threats Discussion


Can you help me understand this Computer Science question?

Give a description of your progress(Machine Learning for Cyber Threats ), what obstacles have you encountered, and what ways have you overcome these obstacles.


Aravindan, C., Frederick, T., Hemamalini, V., & Cathirine, M. V. J. (2020). An Extensive Research on Cyber Threats using Learning Algorithm. 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), 1–8.

Bilen, A., & Özer, A. B. (2021). Cyber-attack method and perpetrator prediction using machine learning algorithms. PeerJ. Computer Science, 7, e475–e475.

Computer Science Homework Help

Flower Girl Case Study



  • A female employee, sales representative, has alleged that another employee, Robert, also a sales representative, has harassed her.
  • This employee showed the Human Resources Department 3 messages that were sent to her.
  • She had been contacted on her private email, by Robert, who became increasingly aggressive and eventually showed up in a coffee shop while she was with a friend.


  • As part of the investigation into the allegation, Robert’s cubicle was searched and a USB flash drive was found, forensically imaged and handled to you.
  • You have the image file: flowergirl.img.
    MD5 of img file = 338ecf17b7fc85bbb2d5ae2bbc729dd5
  • Your job is to analyze it. As you can see this assignment is about “investigating” a case. You have to think critically and evaluate the merits of different possibilities applying your knowledge what you have learned so far and going to learn in next two weeks. Please note there is no step of by step by direction. As you can see providing a direction will kill the investigation. However, I am happy to supervise this projects. So there is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Project work naturally leads into argument, whether that’s about the interpretation of data or the validity of a philosophical viewpoint. But remember this is Digital Forensics – we need clear evidence not just raw data.


You should answer the following questions:

  1. What did you find on the flash drive (what files? In what condition?).
  2. What actions did you take to analyze?
  3. In your opinion, did he harass her or not? Explain why and how you arrived to this conclusion! What did he do?
  4. Why was this case called “the flower girl”?


This assignment is worth up to 200 points towards your final grade. For this assignment clear rubrics is not provided intentionally. Since the overall goal of this project is investigating a case, a step by step rubrics will kill the investigation. However, you will be assessed on the methods of your analysis and how your analysis helped you to turn you finding into evidences. To earn the maximum number of points, you should try to address (not just answer) the following questions in your report:

  • What did you find on the flash drive? A list of all files contained on the drive and their state and (deleted, not deleted, hidden). List everything including the volume.
  • Explanation of the findings: What did you actually do to make the findings into an evidence? What actions did you take to analyze? For example: Finding ten bottles of Coke in one’s table is not enough to conclude that one had all of them. But if you taste the caffeine level in the blood, that might help to conclude.
  • A time line of events. Extremely important – This will lead the investigation.
  • A brief explanation of why the case was called “Flower Girl”? A list of names of people involved. You need to be very careful with this part. Just because you find word ” flower girl” somewhere in the image does not prove that it is related to your case. You need to make it an evidence.
  • Your personal verdict on whether the suspect is guilty or not, and why. (This is the Fun part, just concluding the case. Remember you are stepping into the Administration of justice area and this is not a Forensic Analyst’s job) .
  • Your analysis should not be more than 10-12 pages including the screen captures. Your analysis should be supported by appropriate screen captures! NO points will be given without appropriate screen capture of your analysis.
  • All screen captures must accompany a date stamp. Inside the project report, if any screen capture is found without a date stamp, project won’t be graded.

Computer Science Homework Help

UKNA17 – Artificial Intelligence – Project Design & Evaluation



Please do a project report and source code

A key aspect of this assessment is demonstrating the ability to perform a critical analysis and evaluation. This involves empirical experiments, evaluating the performance of artificial intelligence algorithms and, potentially, data processing techniques, depending on the problem at hand.

proposal : Write no less than 1000 words


You are asked to propose a project idea by following the traditional workflow:

What is the problem to be solved?

– Why are you interested in this particular problem?

– Does the problem need datasets to be available? If so, which dataset is to be used?

– Which approach is appropriate for solving that problem?

Please describe exactly the steps i.e. how
you are going to deal with the problem at hand.

– Which algorithms are planned for the application?

– Which quality measures are to be used to evaluate the algorithms?

cases, please make sure to submit your proposal (a brief description that covers the questions mentioned

Project and Source code :::: ( Project write 3000 word report )


D2: A detailed report that contains the following sections: Front matter, Problem definition,
Methodology (all steps), Experiments & discussion, Conclusion and references. Please name it
Report_AI.doc (or .pdf). Please note also the report should not contain any code, but the

D3: Working and well-documented code (notebook). Please zip it if it contains may files and name
it or Code_AI.rar. If you are using tools to develop your application, please explain
exactly what, how, which parameters, etc. so that your results can be reproduced. Submit that
description as a separate document and name it Setting_AI.doc (or .pdf).

NOTE : In report please follow exactly mentioned in attached document and REPORT MUST BE INCLUDED TABLES AND RELATED DIAGRAMS and Headings

Computer Science Homework Help

Computer Science Question



For this assignment, you were just hired as the Lead Security Manager (LSM) for this organization’s digital forensics department. Your department works closely with the federal government. The team you supervised consist of 30 people with diverse cultures and technical background. This team specializes in collecting digital evidence from crime scenes, extractions, and provide reports to be viewed by the United State Intelligence Community (IC). The IC is also the biggest client for your company. Without this account, your company will have a difficult time operating. Nevertheless, the IC has changed its requirements as it relates to clearance needed to handle evidence, and your company is out of compliance. Each member on your team, including yourself, must obtain at least a public trust clearance from the federal government. You also realize that these objectives need to be completed within 30 business days. Two of these objectives are:

  1. Not all of the people on the team has the required clearance
  2. Team member are using unreliable digital forensic tools to do their work

Assignment Requirements

  1. Create a brief memo for your department introducing yourself, plans for the department, and your expectations from the team. Ideas from the required reading and presentations for the assignment module, as well as biblical integration, must all be integrated into the memo (At least – 1.5 Page)
  2. Create a policy regarding the sensitivity of computer crimes, the use of incorrect tools to collect, and extract evidence (At least 2 pages, double space)
  • Write a report to your boss about the analysis you have conducted on inappropriate tools you have discovered
    • Ensure to use your leadership skills to stress the impacts of using unreliable forensic tools
    • How these tools can jeopardize the forensic investigation process
    • Loss of funding
    • Allow criminals to get away from prosecution (3 Pages)

Computer Science Homework Help

CISS 400 BUC DEA Criminal Trial Witness Analytical Review


I’m working on a operating systems question and need an explanation and answer to help me learn.

There’s been a turn of events. Dan, who was supposed to stand as an expert witness in a criminal trial, can’t make it. This is only your second time standing in as a witness, and you better not mess it up this time!

So, you’ve been retained as an expert witness for the defense. Your examination of the digital evidence, primarily photos and some Microsoft Word documents, shows that the defendant did not send files containing account information to his home computer. You prove this with the header information in the backup files of the emails on the corporate server and an examination of the client’s home computer.

The prosecution is attempting to show that, in your first case that you testified in, you botched an email collection in a civil case. How are you going prove that you are accurate in this case?

Write your response to the attorney’s question that provides your qualifications for testimony as a digital forensics investigator and then describe an overview of your process for capturing and examining the header information. Use your own words and not a published list. The language should be easily understood by the people in the courtroom (they are not forensics experts so avoid technical jargon).

Computer Science Homework Help

SIT War Games Movie in High School Teaching Discussion


I’m working on a cyber security writing question and need guidance to help me learn.

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Computer Science Homework Help

CU Downloaded Software Contract Discussion


A. When asked if you “accept the terms” of downloaded software, describe how clicking “yes” indicates you have entered into a contract. Discuss whether you have ever read these terms of use before you clicked and what the terms say. Minimum 250 words.

Computer Science Homework Help

Governors State University ?DoD Compliance Standard and Controls Essay


I’m studying for my Computer Science class and don’t understand how to answer this. Can you help me study?

Develop the standards and controls that would make an organization DoD compliant.